US20180176088A1 - Virtualized network function monitoring - Google Patents

Virtualized network function monitoring Download PDF

Info

Publication number
US20180176088A1
US20180176088A1 US15/737,327 US201515737327A US2018176088A1 US 20180176088 A1 US20180176088 A1 US 20180176088A1 US 201515737327 A US201515737327 A US 201515737327A US 2018176088 A1 US2018176088 A1 US 2018176088A1
Authority
US
United States
Prior art keywords
vnf
monitoring
kpi
new
provisioning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US15/737,327
Other versions
US10680896B2 (en
Inventor
Kumaresan Ellappan
Ulhas Dhramarao GOURGONDA
Gajendra SUBRAMANYAM
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hewlett Packard Enterprise Development LP
Original Assignee
Hewlett Packard Enterprise Development LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett Packard Enterprise Development LP filed Critical Hewlett Packard Enterprise Development LP
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GOURGONDA, Ulhas Dhramarao, SUBRAMANYAM, Gajendra, ELLAPPAN, Kumaresan
Assigned to HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP reassignment HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Publication of US20180176088A1 publication Critical patent/US20180176088A1/en
Application granted granted Critical
Publication of US10680896B2 publication Critical patent/US10680896B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/0816Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5003Managing SLA; Interaction between SLA and QoS
    • H04L41/5009Determining service level performance parameters or violations of service level contracts, e.g. violations of agreed response time or mean time between failures [MTBF]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/20Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45591Monitoring or debugging support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0895Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements

Definitions

  • Cloud computing networks have reshaped the field of Internet-provided services due to its beneficial nature for individual users as well as large enterprises.
  • the cloud computing networks utilize virtual machines (VMs) that allow virtualization of an actual physical computing system.
  • Network Function Virtualization (NFV) is a network architecture that aims at using cloud computing for providing telecommunication services.
  • a NFV environment includes a plurality of virtualized network functions (VNFs) for performing functions of various network entities, such as load balancers, home location registers, and base stations.
  • VNFs virtualized network functions
  • the VNFs are implemented as virtualized machines such that they can run on a range of industry standard server hardware for implementing the network functions.
  • FIG. 1 illustrates a block diagram of a computing system for provisioning and monitoring virtualized network functions in a network function virtualization environment, according to an example of the present subject matter.
  • FIG. 2 illustrates various example components of a computing system for provisioning and monitoring virtualized network functions, according to an example of the present subject matter.
  • FIG. 3 illustrates an example method for provisioning and monitoring virtualized network functions, according to an example of the present subject matter.
  • FIG. 4 illustrates an example method for provisioning and monitoring virtualized network functions, according to another example of the present subject matter.
  • FIG. 5 illustrates an example network environment implementing a non-transitory computer readable medium for provisioning and monitoring virtualized network functions, according to an example of the present subject matter.
  • Network Function Virtualization (NFV) environment is a cloud computing based network architecture implemented for virtualizing telecommunication network based services. Any NFV environment includes a plurality of virtualized network functions (VNFs) for performing various network functions, such as message routing, traffic analysis, and security measure implementation.
  • VNFs virtualized network functions
  • a network provider may regularly monitor the performance of the VNFs implemented in the NFV environment.
  • One of the approaches for monitoring the performance of the VNFs includes assigning a monitoring rule for each VNF at the time of provisioning the VNF.
  • the monitoring rules include a list of VNF components associated with the VNF along with a list of corresponding performance parameters that have to be monitored for each VNF component.
  • Such monitoring rules may be assigned by a monitoring engine based on the type of VNF such that for all VNFs of a similar type, the same monitoring rule is assigned.
  • Using the same monitoring rule for all VNFs of a similar type may, however, lead to wastage of resources utilized for monitoring the VNFs as irrespective of similarity in type, all VNFs may not be utilizing the VNF components in a similar manner. For instance, a VNF of a particular type may be assigned to an application that extensively utilizes its processing unit, while another VNF of the same type may be assigned to an application that extensively utilizes its disk storage. Assigning a monitoring rule that monitors both the processing unit and the disk storage of all VNFs of the particular type may result in unwanted load over the monitoring engine.
  • VNFs i.e., VNFs having additional or less VNF components in comparison to VNF components associated with regular VNFs of the same VNF type.
  • the monitoring engine may not be able to monitor such component as these VNF components might not have been included in the monitoring rules.
  • the monitoring engine may generate error reports on not being able to locate the VNF components as per the monitoring rules.
  • a system administrator may have to be assigned for manually customizing existing rules in the above described situations.
  • the present approaches facilitate in dynamically assigning monitoring rules for a VNF.
  • a pre-defined set of monitoring rules is maintained and used by a monitoring engine for monitoring performance of the VNFs.
  • the monitoring rules are generated based on a VNF type and a VNF component such that each monitoring rule corresponds to a unique combination of a VNF type and a VNF component.
  • the monitoring engine may determine the VNF type and the VNF component that has to be monitored for the VNF and accordingly obtain a monitoring rule from the pre-defined set.
  • the monitoring engine may monitor those VNF components for which monitoring rules are executed.
  • a plurality of monitoring rules is generated based on the VNF types and VNF components.
  • the monitoring rules are generated such that each monitoring rule corresponds to a unique combination of a VNF type and a VNF component. For instance, if a VNF of particular VNF type may have two VNF components, say, a first component and a second component, then one monitoring rule may correspond to a combination of the particular VNF type and the first component. A second monitoring rule may correspond to a combination of the particular VNF type and the second component.
  • the monitoring rules are subsequently saved in a monitoring rules database for being referred at later time while assigning the monitoring rules to a VNF being provisioned.
  • a VNF monitoring notification may be transmitted to the monitoring engine requesting the monitoring engine to monitor the new VNF.
  • the monitoring notification may indicate a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI.
  • KPI key performance indicator
  • the KPI may correspond to a VNF component that has to be monitored, from among the VNF components used by the new VNF.
  • the monitoring engine may determine a monitoring rule corresponding to the new VNF from among the plurality of monitoring rules, based on the KPI. The monitoring engine may then execute the monitoring rule corresponding to the new VNF for monitoring the performance of the new VNF.
  • the monitoring engine may determine a KPI value of the KPI being monitored at regular intervals as defined in the monitoring rule.
  • the KPI value may then be compared with a KPI threshold value indicated in the monitoring rule to determine the performance of the VNF.
  • an error correction request may be generated for initiating further analysis and error correction.
  • the present subject matter thus facilitates in dynamically assigning monitoring rules for VNFs based on the VNF components that are have to be monitored for monitoring performance of the VNF.
  • monitoring rules are defined based on the VNF type and the VNF component that has to be monitored and saved in a database for being referred to at later stages. Additionally, having a predefined set of monitoring rules helps in reducing time and resources utilized for assigning monitoring rules to VNFs. Further, since each monitoring rule corresponds to a unique combination of a VNF type and a monitoring rule, therefore a monitoring rule can be assigned based on the VNF component that has to be monitored.
  • Assigning monitoring rules based on VNF components helps in reducing the resources utilized in monitoring VNFs as the VNF components that are useful in indicating performance of the VNF may be monitored while other VNF components may not be monitored. Further, a combination of more than one monitoring rules may also be assigned to a VNF in case more than one VNF components have to be monitored for the VNF, thus providing flexibility to the monitoring engine for dynamically assigning monitoring rules.
  • FIGS. 1 to 5 The present subject matter is further described with reference to FIGS. 1 to 5 . It should be noted that the description and figures merely illustrate principles of the present subject matter. It is thus understood that various arrangements may be devised that, although not explicitly described or shown herein, encompass the principles of the present subject matter. Moreover, all statements herein reciting principles, aspects, and examples of the present subject matter, as well as specific examples thereof, are intended to encompass equivalents thereof.
  • FIG. 1 illustrates a computing system 102 , according to an example of the present subject matter.
  • the computing system 102 may be implemented for provisioning and monitoring virtualized network functions (VNFs) in a network function virtualization (NFV) environment.
  • VNFs virtualized network functions
  • NFV network function virtualization
  • the computing system 102 may be a virtual machine hosted in the NFV environment.
  • the computing system 102 may include a monitoring engine 104 for monitoring performance of the VNFs implemented in the NFV environment.
  • the monitoring engine 104 generates a plurality of monitoring rules based on VNF types of various VNFs that may be hosted within the NFV environment and VNF components that may be used by the VNFs.
  • the monitoring engine 104 may generate the monitoring rules such that each monitoring rule corresponds to a unique combination of a VNF type and a VNF component. Further, the monitoring engine 104 may save the monitoring rules for being used for monitoring the VNFs.
  • the monitoring engine 104 may access the monitoring rules to determine a monitoring rule that may be assigned to the new VNF.
  • the VNF monitoring notification indicates a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI.
  • KPI key performance indicator
  • the monitoring engine 104 may obtain the KPI from the VNF monitoring notification and determine a monitoring rule corresponding to the new VNF, from among the plurality of monitoring rules, based on the KPI. For instance, if the KPI relates to performance of a particular VNF component allocated to the new VNF, the monitoring engine 104 obtain a monitoring rule that corresponds to a combination of the particular VNF component and the VNF type of the new VNF.
  • the monitoring engine 104 may subsequently execute the monitoring rule corresponding to the new VNF for monitoring KPIs for determining performance of the new VNF.
  • FIG. 2 illustrates various example components of the computing system 102 , according to an example of the present subject matter.
  • the computing system 102 is hosted in a network function virtualization (NFV) environment 200 .
  • the NFV environment 200 further includes a plurality of virtualized network functions (VNFs) 202 - 1 , 202 - 2 , . . . , 202 - n, hereinafter collectively referred to as VNFs 202 and individually referred to as VNF 202 , communicating with the computing system 102 .
  • VNFs virtualized network functions
  • the NFV environment 200 is a cloud based network architecture implemented for virtualizing telecommunication network based services.
  • a service provider hosting the NFV environment 200 may install one or more of a variety of computing devices (not shown in the figure), such as a desktop computer, cloud servers, mainframe computers, workstation, a multiprocessor system, a network computer, and a server for hosting the VNFs 202 in the form of virtual machines.
  • the VNFs 202 may be hosted in the NFV environment 200 for performing various network functions, such as domain name lookup service, content delivery service, customer premises equipment function, interactive voice response service, home location service for a mobile network, message routing, traffic analysis, and security measure implementation.
  • the VNFs 202 may be hosted as network elements, such as switching elements, mobile network nodes, and firewalls in the NFV environment 200 .
  • Each of the VNFs 202 may thus be hosted as a self-contained platform having its own VNF components 204 , such as processers, storage disks, and network interfaces for running its own operating system and applications.
  • the VNF 202 - 1 and 202 - n may include the VNF components 204 - 1 and 204 - n , respectively.
  • the computing system 102 may be hosted in the NFV environment 200 for provisioning resources for the VNFs 202 and monitoring performance of the VNFs 202 .
  • the computing system 102 includes module(s) 206 , and data 208 .
  • the module(s) 206 include routines, programs, objects, components, and data structures, which perform particular tasks or implement particular abstract data types.
  • the module(s) 206 may also be implemented as, signal processor(s), state machine(s), logic circuitries, and/or any other device or component that manipulate signals based on operational instructions. Further, the module(s) 206 can be implemented by hardware, by computer-readable instructions executed by a processing unit, or by a combination thereof.
  • the module(s) 206 may include a provisioning engine 210 , the monitoring engine 104 , an automation engine 212 and other module(s) 214 .
  • the other modules 214 may include programs or coded instructions that supplement applications and functions, for example, programs in an operating system of the computing system 102 .
  • the data 208 may include monitoring rules database 216 , provisioning templates 218 , and other data 220 .
  • the present subject matter facilitates in dynamically assigning predefined monitoring rules to the VNFs 202 based on the VNF components 204 being used by the VNFs 202 .
  • the monitoring engine 104 may generate a plurality of monitoring rules for being used later while assigning the monitoring rules to a VNF 202 being provisioned in the NFV environment 200 .
  • the monitoring engine 104 may generate the monitoring rules based on VNF types of the VNFs 202 hosted within the NFV environment 200 and the VNF components 204 used by the VNFs 202 .
  • the monitoring engine 104 may initially determine various VNF types, i.e., different types of VNFs 202 that may be hosted within the NFV environment 200 and VNF components 204 that may be used by the VNFs 202 .
  • the monitoring engine 104 may determine the VNF types and the VNF components 204 based on inputs received from either a user or the service provider hosting the NFV environment 200 .
  • the monitoring engine 104 may analyze the VNFs 202 already installed within the NFV environment 200 to determine the VNF types and the VNF components 204 .
  • the monitoring engine 104 may save the monitoring rules in the monitoring rules database 216 for being referenced for monitoring the VNFs 202 .
  • the user may send a provisioning request to the computing system 102 .
  • the provisioning request may include information about the network function which the user wants the new VNF to perform.
  • the provisioning engine 210 may analyze the provisioning request to ascertain the network functionality for which a new VNF 202 has to be hosted in the NFV environment 200 . Based on the network functionality, the provisioning engine 210 may determine the VNF type of the new VNF 202 and the VNF components 204 to be allocated to the new VNF 202 .
  • the provisioning engine 210 may subsequently obtain a provisioning template for provisioning the new VNF based on the provisioning request.
  • the provisioning engine 210 may obtain the provisioning template from the predefined provisioning templates 218 .
  • the provisioning engine 210 may generate the provisioning template for the new VNF 202 based on preset rules and template parameters.
  • the provisioning engine 210 may update the provisioning template to include key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI.
  • KPI are parameters that may be used to indicate performance of different VNF components of a VNF. Examples of KPI include, but are not limited to, central processing unit (CPU) usage, memory usage, number of packets received, and number of packets transmitted.
  • CPU central processing unit
  • each VNF component 204 may have at least one corresponding KPI that may be monitored for tracking performance of the VNF component 204 .
  • the KPI parameters define parameters for determining value of a KPI for a VNF 202 .
  • Example of KPI parameters include, but are not limited to, a KPI target, threshold limits, and monitoring frequency.
  • the KPI target indicates information, such as hostname and IP address about the VNF 202 with which the KPI is associated.
  • the threshold limits indicate performance ranges within which KPI values are acceptable such that an error may be indicated if the KPI value goes beyond the threshold limits.
  • Monitoring frequency indicates how often a KPI has to be checked for obtaining KPI values.
  • the provisioning engine 210 may identify the KPIs and the KPI parameters that have to be monitored for the new VNF based on the VNF components, the VNF type, and other information obtained from the provisioning request. The provisioning engine 210 may subsequently update the provisioning template to include the KPI and the KPI parameters and provision the new VNF 202 . Provisioning the new VNF 202 may include, amongst other procedures, assigning the network functions to the VNF, based on the provisioning request, and provisioning resources to the new VNF 202 for performing the assigned network function. The provisioning engine 210 may further generate and transmit a VNF monitoring notification to the monitoring engine 104 requesting the monitoring engine 104 to monitor the new VNF 202 . The monitoring notification may indicate the KPI to be monitored for the new VNF 202 and the KPI parameters corresponding to the KPI.
  • the monitoring engine 104 may analyze the VNF monitoring notification to determine the KPI that has to be monitored and the KPI parameters corresponding to the KPI.
  • the monitoring engine 104 may subsequently determine a monitoring rule corresponding to the new VNF 202 from among the plurality of monitoring rules saved in the monitoring rules database 216 based on the KPI. For instance, if the new VNF 202 is a home location register (HLR) and the KPI is indicated as CPU usage, the monitoring engine 104 may obtain a monitoring rule having VNF type as HLR and VNF component 204 as a processor.
  • HLR home location register
  • the monitoring engine 104 may obtain more than one monitoring rule, equal to the number of KPIs, with each monitoring rule corresponding to the same VNF type but a different KPI.
  • the monitoring rules may be identified such that for all KPIs mentioned in the VNF monitoring notification, a corresponding monitoring rule is identified.
  • the monitoring engine 104 may update the monitoring rule corresponding to the new VNF 202 based on the KPI parameters indicated in the VNF monitoring notification.
  • the monitoring engine 104 may update the monitoring rule to specify various parameters, such as the details of the VNF component 204 to be monitored, monitoring frequencies, and threshold limits of KPI threshold values based on the KPI parameters indicated in the VNF monitoring notification.
  • the KPI threshold values are various thresholds limit that, if crossed, indicate a fault in the VNF component 204 being monitored. Examples of the KPI threshold values include, but are not limited to, a maximum KPI threshold value, a minimum KPI threshold value, a critical KPI threshold value, a major KPI threshold value, a minor KPI threshold value, and a warning KPI threshold value.
  • the monitoring engine 104 may subsequently execute the monitoring rule for monitoring the performance of the new VNF 202 .
  • the monitoring engine 104 may further determine the KPI value of the KPI at regular intervals as defined in the monitoring rule based on the monitoring frequencies.
  • the monitoring engine 104 may compare the KPI value with the KPI threshold value indicated in the monitoring rule. If the monitoring engine 104 determines the KPI value to be beyond the KPI threshold value, an error correction request may be generated by the monitoring engine for initiating further analysis and error correction.
  • the monitoring engine 104 may compare the KPI value with each of the KPI threshold values indicated in the monitoring rule to determine the performance of the VNF. In such a case, the monitoring engine 104 may generate the error correction request if the KPI value goes beyond any of the KPI threshold value.
  • the error correction request may be generated if the KPI value is determined to be less than the minimum KPI threshold value or greater than the maximum KPI threshold value. Further, the monitoring engine 104 may transmit the error correction request to the automation engine 212 for determining the cause of error in the VNF component 204 corresponding to the KPI being monitored.
  • the automation engine 212 may analyze the error to determine the cause of the error based on error identification parameters, such as the KPI value, the VNF type, and the VNF component 204 being monitored. The automation engine 212 may subsequently transmit a correction request to the provisioning engine 210 requesting the provisioning engine 210 to take a corrective action.
  • the correction request may indicate the cause of error for the KPI value going beyond the KPI threshold value.
  • the provisioning engine 210 may accordingly take the corrective action for the new VNF 202 upon receiving the correction request.
  • the corrective action include, but are not limited to, adjusting capacity of the VNF component 204 or the new VNF 202 , rebooting the VNF component 204 , stopping the operation of the VNF component 204 , balancing the load of the VNF component 202 , migrating the new VNF 202 from the current server hosting the new VNF 202 to another server in order to avoid repetition of the error, and reconfiguring system settings for the VNF component 204 .
  • the provisioning engine 212 may take corrective actions to adjust the capacity of the VNF 202 by adding new resources to the new VNF 202 if the KPI value is greater than the maximum KPI threshold value.
  • the provisioning engine 212 may also adjust the capacity of the new VNF 202 by removing a resource corresponding to the VNF component 204 of the new VNF 202 if the KPI value is less than the minimum KPI threshold value.
  • FIGS. 3 and 4 illustrate example methods 300 and 400 , respectively, for provisioning and monitoring virtualized network functions, in accordance with an example of the present subject matter.
  • the order in which the methods are described is not intended to be construed as a limitation, and any number of the described method blocks may be combined in any order to implement the aforementioned methods, or an alternative method.
  • the methods 300 and 400 may be implemented by processing resource or computing device(s) through any suitable hardware, non-transitory machine readable instructions, or combination thereof.
  • the methods 300 and 400 may be performed by virtualized computing systems, such as the computing system 102 hosted in a network function virtualization environment. Furthermore, the methods 300 and 400 may be executed based on instructions stored in a non-transitory computer readable medium, as will be readily understood.
  • the non-transitory computer readable medium may include, for example, digital memories, magnetic storage media, such as one or more magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media.
  • a provisioning request received for provisioning a new VNF is analyzed.
  • the provisioning request is analyzed to determine a VNF type of the new VNF and VNF components to be allocated to the new VNF.
  • the provisioning request may be received and analyzed by a provisioning engine of a computing system, such as the computing system 102 hosted in a network function virtualization environment.
  • a provisioning template is populated for provisioning the new VNF to include a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI.
  • KPI key performance indicator
  • a VNF component whose performance has to be monitored is identified, from among the VNF components allocated to the new VNF.
  • the KPI corresponding to the VNF component may be included in the provisioning template along with the KPI parameters.
  • a predefined monitoring rule corresponding to the new VNF is determined from among a plurality of monitoring rules predefined in a monitoring rules database.
  • the monitoring rule is determined by a monitoring engine of the computing system 102 based on the KPI.
  • Each of the plurality of monitoring rules corresponds to a unique combination of a VNF type and a VNF component.
  • the monitoring rule determined for the VNF may thus correspond to a combination of the VNF type of the new VNF and the VNF component for which the KPI was included in the provisioning template.
  • the monitoring rule corresponding to the new VNF is executed for monitoring KPIs for determining performance of the new VNF.
  • a plurality of monitoring rules is generated.
  • the monitoring rules are generated based on VNF types and VNF components.
  • a monitoring engine such as the monitoring engine 104 of the computing system 102 may generate the monitoring rules such that each monitoring rule corresponds to a unique combination of a VNF type and a VNF component.
  • the plurality of monitoring rules is saved in a monitoring rules database.
  • the monitoring engine may save the monitoring rules in the monitoring rules database so that the monitoring rules can be referred for assigning monitoring rules to a VNF at the time of provisioning the VNF.
  • a provisioning request received for provisioning a new VNF is analyzed.
  • the provisioning request is received by a provisioning engine, such as the provisioning engine 210 of the computing system 102 hosted in a network function virtualization environment.
  • the provisioning request is analyzed to determine a VNF type of the new VNF and VNF components to be allocated to the new VNF.
  • a provisioning template is populated for provisioning the new VNF.
  • the provisioning template is populated to include a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI.
  • KPI key performance indicator
  • the provisioning template may be initially obtained by a provisioning engine based on the provisioning request. Further, a VNF component whose performance has to be monitored is identified, from among the VNF components allocated to the new VNF and the KPI corresponding to the VNF component may be included in the provisioning template along with the KPI parameters.
  • a predefined monitoring rule corresponding to the new VNF is determined.
  • the monitoring rule is obtained from among a plurality of monitoring rules predefined in the monitoring rules database.
  • the monitoring rule is determined by a monitoring engine of the computing system 102 based on the KPI.
  • Each of the plurality of monitoring rules corresponds to a unique combination of a VNF type and a VNF component.
  • the monitoring rule determined for the VNF may thus correspond to a combination of the VNF type of the new VNF and the VNF component for which the KPI was included in the provisioning template.
  • the monitoring rule corresponding to the new VNF is executed for monitoring the KPI for determining performance of the new VNF.
  • the performance of the VNF component is monitored to determine a KPI value of the KPI being monitored.
  • the monitoring engine may determine the KPI value of the KPI being monitored at regular intervals as defined in the monitoring rule. The KPI value may then be compared with a KPI threshold value indicated in the monitoring rule to determine the performance of the VNF. The performance is monitored to ascertain whether a corrective action needs to be taken for the new VNF.
  • FIG. 5 illustrates an example network environment implementing a non-transitory computer readable medium for file system replication, according to an example of the present disclosure.
  • the system environment 500 may comprise at least a portion of a public networking environment or a private networking environment, or a combination thereof.
  • the system environment 500 includes a processing resource 502 communicatively coupled to a computer readable medium 504 through a communication link 506 .
  • the processing resource 502 can include one or more processors of a computing device for file system replication.
  • the computer readable medium 504 can be, for example, an internal memory device of the computing device or an external memory device.
  • the communication link 506 may be a direct communication link, such as any memory read/write interface.
  • the communication link 506 may be an indirect communication link, such as a network interface.
  • the processing resource 502 can access the computer readable medium 504 through a network 508 .
  • the network 508 may be a single network or a combination of multiple networks and may use a variety of different communication protocols.
  • the processing resource 502 and the computer readable medium 504 may also be coupled to requested data sources 510 through the communication link 506 , and/or to communication devices 512 over the network 508 .
  • the coupling with the requested data sources 510 enables in receiving the requested data in an offline environment
  • the coupling with the communication devices 512 enables in receiving the requested data in an online environment.
  • the computer readable medium 504 includes a set of computer readable instructions, implementing a monitoring engine 514 .
  • the set of computer readable instructions can be accessed by the processing resource 502 through the communication link 506 and subsequently executed to process requested data communicated with the requested data sources 510 in order to facilitate provisioning and monitoring virtualized network functions (VNFs).
  • VNFs virtualized network functions
  • the instructions of the monitoring engine 514 may perform the functionalities described above in relation to the monitoring engine 104 .
  • the monitoring engine 514 may receive a VNF monitoring notification for monitoring a new VNF provisioned recently.
  • the VNF monitoring notification indicates a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI.
  • KPI corresponds to a VNF component that has to be monitored, from among the VNF components allocated to the new VNF.
  • the monitoring engine 514 may determine a predefined monitoring rule corresponding to the new VNF based on the KPI.
  • the monitoring engine 514 may obtain the monitoring rule, from among a plurality of monitoring rules predefined in a monitoring rules database.
  • the monitoring rules are predefined such that each monitoring rule corresponds to a unique combination of a VNF type and a VNF component.
  • the monitoring engine 514 may further execute the monitoring rule corresponding to the new VNF for monitoring performance of the new VNF using the KPI parameters.
  • the monitoring engine 514 may monitor the performance of the VNF component at regular intervals defined in the monitoring rule to determine a KPI value of the KPI being monitored.
  • the monitoring engine 514 may subsequently compare the KPI value with a KPI threshold value indicated in the monitoring rule corresponding to the new VNF to determine whether a corrective action needs to be taken for the new VNF. For instance, if the KPI value goes beyond KPI threshold value, the monitoring engine 514 may determine a corrective action has to be taken and accordingly request other modules of the computer readable medium 504 to analyze the cause of the error and accordingly take the corrective action.
  • the monitoring engine 514 may compare the KPI value with each of a plurality of KPI threshold values indicated in the monitoring rule to determine the performance of the VNF.

Abstract

A computing system comprising a monitoring engine to generate and save a plurality of monitoring rules based on virtualized network function (VNF) types and VNF components. Each monitoring rule corresponds to a unique combination of a VNF type and a VNF component. The monitoring engine further receives a VNF monitoring notification for monitoring a new VNF provisioned in a network function virtualization environment. The VNF monitoring notification indicates a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI. Further, the monitoring engine determines a monitoring rule corresponding to the new VNF, from among the plurality of monitoring rules, based on the KPI. The monitoring engine subsequently executes the monitoring rule corresponding to the new VNF for monitoring KPIs for determining performance of the new VNF.

Description

    BACKGROUND
  • Cloud computing networks have reshaped the field of Internet-provided services due to its beneficial nature for individual users as well as large enterprises. The cloud computing networks utilize virtual machines (VMs) that allow virtualization of an actual physical computing system. Network Function Virtualization (NFV) is a network architecture that aims at using cloud computing for providing telecommunication services. A NFV environment includes a plurality of virtualized network functions (VNFs) for performing functions of various network entities, such as load balancers, home location registers, and base stations. The VNFs are implemented as virtualized machines such that they can run on a range of industry standard server hardware for implementing the network functions.
  • BRIEF DESCRIPTION OF DRAWINGS
  • The detailed description is described with reference to the accompanying figures. It should be noted that the description and figures are merely example of the present subject matter and are not meant to represent the subject matter itself.
  • FIG. 1 illustrates a block diagram of a computing system for provisioning and monitoring virtualized network functions in a network function virtualization environment, according to an example of the present subject matter.
  • FIG. 2 illustrates various example components of a computing system for provisioning and monitoring virtualized network functions, according to an example of the present subject matter.
  • FIG. 3 illustrates an example method for provisioning and monitoring virtualized network functions, according to an example of the present subject matter.
  • FIG. 4 illustrates an example method for provisioning and monitoring virtualized network functions, according to another example of the present subject matter.
  • FIG. 5 illustrates an example network environment implementing a non-transitory computer readable medium for provisioning and monitoring virtualized network functions, according to an example of the present subject matter.
  • DETAILED DESCRIPTION
  • Network Function Virtualization (NFV) environment is a cloud computing based network architecture implemented for virtualizing telecommunication network based services. Any NFV environment includes a plurality of virtualized network functions (VNFs) for performing various network functions, such as message routing, traffic analysis, and security measure implementation.
  • To efficiently implement and maintain the VNFs, a network provider may regularly monitor the performance of the VNFs implemented in the NFV environment. One of the approaches for monitoring the performance of the VNFs includes assigning a monitoring rule for each VNF at the time of provisioning the VNF. The monitoring rules include a list of VNF components associated with the VNF along with a list of corresponding performance parameters that have to be monitored for each VNF component. Such monitoring rules may be assigned by a monitoring engine based on the type of VNF such that for all VNFs of a similar type, the same monitoring rule is assigned.
  • Using the same monitoring rule for all VNFs of a similar type may, however, lead to wastage of resources utilized for monitoring the VNFs as irrespective of similarity in type, all VNFs may not be utilizing the VNF components in a similar manner. For instance, a VNF of a particular type may be assigned to an application that extensively utilizes its processing unit, while another VNF of the same type may be assigned to an application that extensively utilizes its disk storage. Assigning a monitoring rule that monitors both the processing unit and the disk storage of all VNFs of the particular type may result in unwanted load over the monitoring engine.
  • Further, such an approach may not support customization of VNFs, i.e., VNFs having additional or less VNF components in comparison to VNF components associated with regular VNFs of the same VNF type. In case additional VNF components are present, the monitoring engine may not be able to monitor such component as these VNF components might not have been included in the monitoring rules. In case of reduced VNF components, the monitoring engine may generate error reports on not being able to locate the VNF components as per the monitoring rules. Thus, a system administrator may have to be assigned for manually customizing existing rules in the above described situations.
  • Approaches for provisioning and monitoring virtualized network functions in a network function virtualization environment are described. The present approaches facilitate in dynamically assigning monitoring rules for a VNF. As per an example of the present subject matter, a pre-defined set of monitoring rules is maintained and used by a monitoring engine for monitoring performance of the VNFs. The monitoring rules are generated based on a VNF type and a VNF component such that each monitoring rule corresponds to a unique combination of a VNF type and a VNF component. While assigning the monitoring rules to a VNF, the monitoring engine may determine the VNF type and the VNF component that has to be monitored for the VNF and accordingly obtain a monitoring rule from the pre-defined set. Thus, for each VNF, the monitoring engine may monitor those VNF components for which monitoring rules are executed.
  • In accordance to an example of the present subject matter, a plurality of monitoring rules is generated based on the VNF types and VNF components. The monitoring rules are generated such that each monitoring rule corresponds to a unique combination of a VNF type and a VNF component. For instance, if a VNF of particular VNF type may have two VNF components, say, a first component and a second component, then one monitoring rule may correspond to a combination of the particular VNF type and the first component. A second monitoring rule may correspond to a combination of the particular VNF type and the second component. The monitoring rules are subsequently saved in a monitoring rules database for being referred at later time while assigning the monitoring rules to a VNF being provisioned.
  • In operation, upon provisioning of resources for a new VNF, a VNF monitoring notification may be transmitted to the monitoring engine requesting the monitoring engine to monitor the new VNF. In one example, the monitoring notification may indicate a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI. The KPI may correspond to a VNF component that has to be monitored, from among the VNF components used by the new VNF. Upon receiving the VNF monitoring notification, the monitoring engine may determine a monitoring rule corresponding to the new VNF from among the plurality of monitoring rules, based on the KPI. The monitoring engine may then execute the monitoring rule corresponding to the new VNF for monitoring the performance of the new VNF.
  • In one example, the monitoring engine may determine a KPI value of the KPI being monitored at regular intervals as defined in the monitoring rule. The KPI value may then be compared with a KPI threshold value indicated in the monitoring rule to determine the performance of the VNF. In case the KPI value goes beyond the KPI threshold value, an error correction request may be generated for initiating further analysis and error correction.
  • The present subject matter thus facilitates in dynamically assigning monitoring rules for VNFs based on the VNF components that are have to be monitored for monitoring performance of the VNF. As previously described, monitoring rules are defined based on the VNF type and the VNF component that has to be monitored and saved in a database for being referred to at later stages. Additionally, having a predefined set of monitoring rules helps in reducing time and resources utilized for assigning monitoring rules to VNFs. Further, since each monitoring rule corresponds to a unique combination of a VNF type and a monitoring rule, therefore a monitoring rule can be assigned based on the VNF component that has to be monitored. Assigning monitoring rules based on VNF components helps in reducing the resources utilized in monitoring VNFs as the VNF components that are useful in indicating performance of the VNF may be monitored while other VNF components may not be monitored. Further, a combination of more than one monitoring rules may also be assigned to a VNF in case more than one VNF components have to be monitored for the VNF, thus providing flexibility to the monitoring engine for dynamically assigning monitoring rules.
  • The present subject matter is further described with reference to FIGS. 1 to 5. It should be noted that the description and figures merely illustrate principles of the present subject matter. It is thus understood that various arrangements may be devised that, although not explicitly described or shown herein, encompass the principles of the present subject matter. Moreover, all statements herein reciting principles, aspects, and examples of the present subject matter, as well as specific examples thereof, are intended to encompass equivalents thereof.
  • FIG. 1 illustrates a computing system 102, according to an example of the present subject matter. The computing system 102 may be implemented for provisioning and monitoring virtualized network functions (VNFs) in a network function virtualization (NFV) environment. The computing system 102 may be a virtual machine hosted in the NFV environment.
  • The computing system 102 may include a monitoring engine 104 for monitoring performance of the VNFs implemented in the NFV environment. In one example, the monitoring engine 104 generates a plurality of monitoring rules based on VNF types of various VNFs that may be hosted within the NFV environment and VNF components that may be used by the VNFs. The monitoring engine 104 may generate the monitoring rules such that each monitoring rule corresponds to a unique combination of a VNF type and a VNF component. Further, the monitoring engine 104 may save the monitoring rules for being used for monitoring the VNFs.
  • For instance, upon receiving a VNF monitoring notification for monitoring a new VNF provisioned in NFV environment, the monitoring engine 104 may access the monitoring rules to determine a monitoring rule that may be assigned to the new VNF. In one example, the VNF monitoring notification indicates a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI. The monitoring engine 104 may obtain the KPI from the VNF monitoring notification and determine a monitoring rule corresponding to the new VNF, from among the plurality of monitoring rules, based on the KPI. For instance, if the KPI relates to performance of a particular VNF component allocated to the new VNF, the monitoring engine 104 obtain a monitoring rule that corresponds to a combination of the particular VNF component and the VNF type of the new VNF.
  • The monitoring engine 104 may subsequently execute the monitoring rule corresponding to the new VNF for monitoring KPIs for determining performance of the new VNF.
  • FIG. 2 illustrates various example components of the computing system 102, according to an example of the present subject matter. In one example the computing system 102 is hosted in a network function virtualization (NFV) environment 200. The NFV environment 200 further includes a plurality of virtualized network functions (VNFs) 202-1, 202-2, . . . , 202-n, hereinafter collectively referred to as VNFs 202 and individually referred to as VNF 202, communicating with the computing system 102.
  • In one example, the NFV environment 200 is a cloud based network architecture implemented for virtualizing telecommunication network based services. A service provider hosting the NFV environment 200 may install one or more of a variety of computing devices (not shown in the figure), such as a desktop computer, cloud servers, mainframe computers, workstation, a multiprocessor system, a network computer, and a server for hosting the VNFs 202 in the form of virtual machines. In one example, the VNFs 202 may be hosted in the NFV environment 200 for performing various network functions, such as domain name lookup service, content delivery service, customer premises equipment function, interactive voice response service, home location service for a mobile network, message routing, traffic analysis, and security measure implementation. The VNFs 202 may be hosted as network elements, such as switching elements, mobile network nodes, and firewalls in the NFV environment 200. Each of the VNFs 202 may thus be hosted as a self-contained platform having its own VNF components 204, such as processers, storage disks, and network interfaces for running its own operating system and applications. For instance, the VNF 202-1 and 202-n may include the VNF components 204-1 and 204-n, respectively.
  • As previously described, the computing system 102 may be hosted in the NFV environment 200 for provisioning resources for the VNFs 202 and monitoring performance of the VNFs 202. In one example, the computing system 102 includes module(s) 206, and data 208.
  • The module(s) 206, amongst other things, include routines, programs, objects, components, and data structures, which perform particular tasks or implement particular abstract data types. The module(s) 206 may also be implemented as, signal processor(s), state machine(s), logic circuitries, and/or any other device or component that manipulate signals based on operational instructions. Further, the module(s) 206 can be implemented by hardware, by computer-readable instructions executed by a processing unit, or by a combination thereof.
  • The module(s) 206 may include a provisioning engine 210, the monitoring engine 104, an automation engine 212 and other module(s) 214. The other modules 214 may include programs or coded instructions that supplement applications and functions, for example, programs in an operating system of the computing system 102. Further, the data 208 may include monitoring rules database 216, provisioning templates 218, and other data 220.
  • As previously described, the present subject matter facilitates in dynamically assigning predefined monitoring rules to the VNFs 202 based on the VNF components 204 being used by the VNFs 202. In one example, the monitoring engine 104 may generate a plurality of monitoring rules for being used later while assigning the monitoring rules to a VNF 202 being provisioned in the NFV environment 200. The monitoring engine 104 may generate the monitoring rules based on VNF types of the VNFs 202 hosted within the NFV environment 200 and the VNF components 204 used by the VNFs 202. The monitoring engine 104 may initially determine various VNF types, i.e., different types of VNFs 202 that may be hosted within the NFV environment 200 and VNF components 204 that may be used by the VNFs 202. In one example, the monitoring engine 104 may determine the VNF types and the VNF components 204 based on inputs received from either a user or the service provider hosting the NFV environment 200. In another example, the monitoring engine 104 may analyze the VNFs 202 already installed within the NFV environment 200 to determine the VNF types and the VNF components 204. On generating the monitoring rules based on the VNF types and the VNF components 204, the monitoring engine 104 may save the monitoring rules in the monitoring rules database 216 for being referenced for monitoring the VNFs 202.
  • In operation, when a user, say, a network service provider wishes to install a new VNF for providing certain network function, the user may send a provisioning request to the computing system 102. The provisioning request may include information about the network function which the user wants the new VNF to perform. Upon receiving the provisioning request, the provisioning engine 210 may analyze the provisioning request to ascertain the network functionality for which a new VNF 202 has to be hosted in the NFV environment 200. Based on the network functionality, the provisioning engine 210 may determine the VNF type of the new VNF 202 and the VNF components 204 to be allocated to the new VNF 202.
  • The provisioning engine 210 may subsequently obtain a provisioning template for provisioning the new VNF based on the provisioning request. In one example, the provisioning engine 210 may obtain the provisioning template from the predefined provisioning templates 218. In another example, the provisioning engine 210 may generate the provisioning template for the new VNF 202 based on preset rules and template parameters.
  • Upon obtaining the provisioning template, the provisioning engine 210 may update the provisioning template to include key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI. KPI are parameters that may be used to indicate performance of different VNF components of a VNF. Examples of KPI include, but are not limited to, central processing unit (CPU) usage, memory usage, number of packets received, and number of packets transmitted. Thus, each VNF component 204 may have at least one corresponding KPI that may be monitored for tracking performance of the VNF component 204.
  • The KPI parameters define parameters for determining value of a KPI for a VNF 202. Example of KPI parameters include, but are not limited to, a KPI target, threshold limits, and monitoring frequency. The KPI target indicates information, such as hostname and IP address about the VNF 202 with which the KPI is associated. The threshold limits indicate performance ranges within which KPI values are acceptable such that an error may be indicated if the KPI value goes beyond the threshold limits. Monitoring frequency indicates how often a KPI has to be checked for obtaining KPI values.
  • In one example, the provisioning engine 210 may identify the KPIs and the KPI parameters that have to be monitored for the new VNF based on the VNF components, the VNF type, and other information obtained from the provisioning request. The provisioning engine 210 may subsequently update the provisioning template to include the KPI and the KPI parameters and provision the new VNF 202. Provisioning the new VNF 202 may include, amongst other procedures, assigning the network functions to the VNF, based on the provisioning request, and provisioning resources to the new VNF 202 for performing the assigned network function. The provisioning engine 210 may further generate and transmit a VNF monitoring notification to the monitoring engine 104 requesting the monitoring engine 104 to monitor the new VNF 202. The monitoring notification may indicate the KPI to be monitored for the new VNF 202 and the KPI parameters corresponding to the KPI.
  • The monitoring engine 104 may analyze the VNF monitoring notification to determine the KPI that has to be monitored and the KPI parameters corresponding to the KPI. The monitoring engine 104 may subsequently determine a monitoring rule corresponding to the new VNF 202 from among the plurality of monitoring rules saved in the monitoring rules database 216 based on the KPI. For instance, if the new VNF 202 is a home location register (HLR) and the KPI is indicated as CPU usage, the monitoring engine 104 may obtain a monitoring rule having VNF type as HLR and VNF component 204 as a processor. Further, in case the VNF monitoring notification indicates more than one KPI, the monitoring engine 104 may obtain more than one monitoring rule, equal to the number of KPIs, with each monitoring rule corresponding to the same VNF type but a different KPI. The monitoring rules may be identified such that for all KPIs mentioned in the VNF monitoring notification, a corresponding monitoring rule is identified. Thus, having monitoring rules predefined based on VNF components and VNF types facilitates the monitoring engine 104 in assigning various combinations of the monitoring rules based on VNF components 204 that have to be monitored for the VNF.
  • Further, the monitoring engine 104 may update the monitoring rule corresponding to the new VNF 202 based on the KPI parameters indicated in the VNF monitoring notification. In one example, the monitoring engine 104 may update the monitoring rule to specify various parameters, such as the details of the VNF component 204 to be monitored, monitoring frequencies, and threshold limits of KPI threshold values based on the KPI parameters indicated in the VNF monitoring notification. The KPI threshold values are various thresholds limit that, if crossed, indicate a fault in the VNF component 204 being monitored. Examples of the KPI threshold values include, but are not limited to, a maximum KPI threshold value, a minimum KPI threshold value, a critical KPI threshold value, a major KPI threshold value, a minor KPI threshold value, and a warning KPI threshold value.
  • The monitoring engine 104 may subsequently execute the monitoring rule for monitoring the performance of the new VNF 202. The monitoring engine 104 may further determine the KPI value of the KPI at regular intervals as defined in the monitoring rule based on the monitoring frequencies. The monitoring engine 104 may compare the KPI value with the KPI threshold value indicated in the monitoring rule. If the monitoring engine 104 determines the KPI value to be beyond the KPI threshold value, an error correction request may be generated by the monitoring engine for initiating further analysis and error correction. In one example, the monitoring engine 104 may compare the KPI value with each of the KPI threshold values indicated in the monitoring rule to determine the performance of the VNF. In such a case, the monitoring engine 104 may generate the error correction request if the KPI value goes beyond any of the KPI threshold value. For instance, the error correction request may be generated if the KPI value is determined to be less than the minimum KPI threshold value or greater than the maximum KPI threshold value. Further, the monitoring engine 104 may transmit the error correction request to the automation engine 212 for determining the cause of error in the VNF component 204 corresponding to the KPI being monitored.
  • Upon receiving the error correction request, the automation engine 212 may analyze the error to determine the cause of the error based on error identification parameters, such as the KPI value, the VNF type, and the VNF component 204 being monitored. The automation engine 212 may subsequently transmit a correction request to the provisioning engine 210 requesting the provisioning engine 210 to take a corrective action. The correction request may indicate the cause of error for the KPI value going beyond the KPI threshold value.
  • The provisioning engine 210 may accordingly take the corrective action for the new VNF 202 upon receiving the correction request. Examples of the corrective action include, but are not limited to, adjusting capacity of the VNF component 204 or the new VNF 202, rebooting the VNF component 204, stopping the operation of the VNF component 204, balancing the load of the VNF component 202, migrating the new VNF 202 from the current server hosting the new VNF 202 to another server in order to avoid repetition of the error, and reconfiguring system settings for the VNF component 204. For instance, the provisioning engine 212 may take corrective actions to adjust the capacity of the VNF 202 by adding new resources to the new VNF 202 if the KPI value is greater than the maximum KPI threshold value. The provisioning engine 212 may also adjust the capacity of the new VNF 202 by removing a resource corresponding to the VNF component 204 of the new VNF 202 if the KPI value is less than the minimum KPI threshold value.
  • FIGS. 3 and 4 illustrate example methods 300 and 400, respectively, for provisioning and monitoring virtualized network functions, in accordance with an example of the present subject matter. The order in which the methods are described is not intended to be construed as a limitation, and any number of the described method blocks may be combined in any order to implement the aforementioned methods, or an alternative method. Furthermore, the methods 300 and 400 may be implemented by processing resource or computing device(s) through any suitable hardware, non-transitory machine readable instructions, or combination thereof.
  • It may also be understood that the methods 300 and 400 may be performed by virtualized computing systems, such as the computing system 102 hosted in a network function virtualization environment. Furthermore, the methods 300 and 400 may be executed based on instructions stored in a non-transitory computer readable medium, as will be readily understood. The non-transitory computer readable medium may include, for example, digital memories, magnetic storage media, such as one or more magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media.
  • Further, the methods 300 and 400 are described below with reference to the computing system 102 as described above, other suitable systems for the execution of these methods can be utilized. Additionally, implementation of these methods is not limited to such examples.
  • Referring to FIG. 3, at block 302, a provisioning request received for provisioning a new VNF is analyzed. In one example, the provisioning request is analyzed to determine a VNF type of the new VNF and VNF components to be allocated to the new VNF. The provisioning request may be received and analyzed by a provisioning engine of a computing system, such as the computing system 102 hosted in a network function virtualization environment.
  • At block 304, a provisioning template is populated for provisioning the new VNF to include a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI. In one example, upon determining the VNF type and the VNF components to be used, a VNF component whose performance has to be monitored is identified, from among the VNF components allocated to the new VNF. Subsequently, the KPI corresponding to the VNF component may be included in the provisioning template along with the KPI parameters.
  • At block 306, a predefined monitoring rule corresponding to the new VNF is determined from among a plurality of monitoring rules predefined in a monitoring rules database. In one example, the monitoring rule is determined by a monitoring engine of the computing system 102 based on the KPI. Each of the plurality of monitoring rules corresponds to a unique combination of a VNF type and a VNF component. The monitoring rule determined for the VNF may thus correspond to a combination of the VNF type of the new VNF and the VNF component for which the KPI was included in the provisioning template.
  • At block 308, the monitoring rule corresponding to the new VNF is executed for monitoring KPIs for determining performance of the new VNF.
  • Referring to FIG. 4, at block 402, a plurality of monitoring rules is generated. In one example, the monitoring rules are generated based on VNF types and VNF components. For instance, a monitoring engine, such as the monitoring engine 104 of the computing system 102 may generate the monitoring rules such that each monitoring rule corresponds to a unique combination of a VNF type and a VNF component.
  • At block 404, the plurality of monitoring rules is saved in a monitoring rules database. In an example, the monitoring engine may save the monitoring rules in the monitoring rules database so that the monitoring rules can be referred for assigning monitoring rules to a VNF at the time of provisioning the VNF.
  • At block 406, a provisioning request received for provisioning a new VNF is analyzed. In one example, the provisioning request is received by a provisioning engine, such as the provisioning engine 210 of the computing system 102 hosted in a network function virtualization environment. The provisioning request is analyzed to determine a VNF type of the new VNF and VNF components to be allocated to the new VNF.
  • At block 408, a provisioning template is populated for provisioning the new VNF. In one example, the provisioning template is populated to include a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI. The provisioning template may be initially obtained by a provisioning engine based on the provisioning request. Further, a VNF component whose performance has to be monitored is identified, from among the VNF components allocated to the new VNF and the KPI corresponding to the VNF component may be included in the provisioning template along with the KPI parameters.
  • At block 410, a predefined monitoring rule corresponding to the new VNF is determined. In one example, the monitoring rule is obtained from among a plurality of monitoring rules predefined in the monitoring rules database. The monitoring rule is determined by a monitoring engine of the computing system 102 based on the KPI. Each of the plurality of monitoring rules corresponds to a unique combination of a VNF type and a VNF component. The monitoring rule determined for the VNF may thus correspond to a combination of the VNF type of the new VNF and the VNF component for which the KPI was included in the provisioning template.
  • At block 412, the monitoring rule corresponding to the new VNF is executed for monitoring the KPI for determining performance of the new VNF.
  • At block 414, the performance of the VNF component is monitored to determine a KPI value of the KPI being monitored. In one example, the monitoring engine may determine the KPI value of the KPI being monitored at regular intervals as defined in the monitoring rule. The KPI value may then be compared with a KPI threshold value indicated in the monitoring rule to determine the performance of the VNF. The performance is monitored to ascertain whether a corrective action needs to be taken for the new VNF.
  • FIG. 5 illustrates an example network environment implementing a non-transitory computer readable medium for file system replication, according to an example of the present disclosure. The system environment 500 may comprise at least a portion of a public networking environment or a private networking environment, or a combination thereof. In one implementation, the system environment 500 includes a processing resource 502 communicatively coupled to a computer readable medium 504 through a communication link 506.
  • For example, the processing resource 502 can include one or more processors of a computing device for file system replication. The computer readable medium 504 can be, for example, an internal memory device of the computing device or an external memory device. In one implementation, the communication link 506 may be a direct communication link, such as any memory read/write interface. In another implementation, the communication link 506 may be an indirect communication link, such as a network interface. In such a case, the processing resource 502 can access the computer readable medium 504 through a network 508. The network 508 may be a single network or a combination of multiple networks and may use a variety of different communication protocols.
  • The processing resource 502 and the computer readable medium 504 may also be coupled to requested data sources 510 through the communication link 506, and/or to communication devices 512 over the network 508. The coupling with the requested data sources 510 enables in receiving the requested data in an offline environment, and the coupling with the communication devices 512 enables in receiving the requested data in an online environment.
  • In one implementation, the computer readable medium 504 includes a set of computer readable instructions, implementing a monitoring engine 514. The set of computer readable instructions can be accessed by the processing resource 502 through the communication link 506 and subsequently executed to process requested data communicated with the requested data sources 510 in order to facilitate provisioning and monitoring virtualized network functions (VNFs). When executed by the processing resource 502, the instructions of the monitoring engine 514 may perform the functionalities described above in relation to the monitoring engine 104.
  • For example, the monitoring engine 514 may receive a VNF monitoring notification for monitoring a new VNF provisioned recently. In one example, the VNF monitoring notification indicates a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI. The KPI corresponds to a VNF component that has to be monitored, from among the VNF components allocated to the new VNF. On receiving the VNF monitoring notification, the monitoring engine 514 may determine a predefined monitoring rule corresponding to the new VNF based on the KPI. The monitoring engine 514 may obtain the monitoring rule, from among a plurality of monitoring rules predefined in a monitoring rules database. In one example, the monitoring rules are predefined such that each monitoring rule corresponds to a unique combination of a VNF type and a VNF component.
  • The monitoring engine 514 may further execute the monitoring rule corresponding to the new VNF for monitoring performance of the new VNF using the KPI parameters. In one example, the monitoring engine 514 may monitor the performance of the VNF component at regular intervals defined in the monitoring rule to determine a KPI value of the KPI being monitored. The monitoring engine 514 may subsequently compare the KPI value with a KPI threshold value indicated in the monitoring rule corresponding to the new VNF to determine whether a corrective action needs to be taken for the new VNF. For instance, if the KPI value goes beyond KPI threshold value, the monitoring engine 514 may determine a corrective action has to be taken and accordingly request other modules of the computer readable medium 504 to analyze the cause of the error and accordingly take the corrective action.
  • In one example, the monitoring engine 514 may compare the KPI value with each of a plurality of KPI threshold values indicated in the monitoring rule to determine the performance of the VNF.
  • Although examples for the present disclosure have been described in language specific to structural features and/or methods, it should stood that the appended claims are not necessarily limited to the specific features or methods described. Rather, the specific features and methods are disclosed and explained as examples of the present disclosure.

Claims (15)

What is claimed:
1. A computing system comprising:
a monitoring engine to:
generate and save a plurality of monitoring rules based on virtualized network function (VNF) types and VNF components, wherein each monitoring rule corresponds to a unique combination of a VNF type and a VNF component;
receive a VNF monitoring notification for monitoring a new VNF provisioned in a network function virtualization environment, wherein the VNF monitoring notification indicates a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI;
determine a monitoring rule corresponding to the new VNF, from among the plurality of monitoring rules, based on the KPI; and
execute the monitoring rule corresponding to the new VNF for monitoring KPIs for determining performance of the new VNF.
2. The computing system as claimed in claim 1, further comprising a provisioning engine to:
receive a provisioning request for implementing the new VNF;
analyze the provisioning request to determine a VNF type of the new VNF and the VNF components to be allocated to the new VNF;
obtain a provisioning template for provisioning the new VNF based on the provisioning request;
update the provisioning template to include the KPI to be monitored and the KPI parameters based on a VNF component that has to be monitored, from among the VNF components allocated to the new VNF, wherein the KPI parameters include a target, the KPI threshold value, and a frequency; and
provision resources for the new VNF using the provisioning template.
3. The computing system as claimed in claim 1, wherein the monitoring engine further is to:
determine a KPI value of the KPI being monitored;
compare the KPI value with a KPI threshold value indicated in the monitoring rule corresponding to the new VNF; and
transmit, based on the comparison, an error correction request to an automation engine of the computing system for determining cause of error in the VNF component corresponding to the KPI being monitored.
4. The computing system as claimed in claim 3, wherein the provisioning engine further is to:
receive a correction request from the automation engine for taking a corrective action; and
take the corrective action for the new VNF upon receiving the correction request.
5. The computing system as claimed in claim 1, wherein the monitoring engine further is to update the monitoring rule corresponding to the new VNF based on the KPI parameters indicated in the VNF monitoring notification before deploying the monitoring rule for monitoring performance of the new VNF.
6. A method comprising:
analyzing a provisioning request received for provisioning a new virtualized network function (VNF) to determine a VNF type of the new VNF and VNF components to be allocated to the new VNF;
populating a provisioning template for provisioning the new VNF to include a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI based on a VNF component that has to be monitored, from among the VNF components allocated to the new VNF;
determining a predefined monitoring rule corresponding to the new VNF, from among a plurality of monitoring rules predefined in a monitoring rules database, based on the KPI, wherein each monitoring rule corresponds to a unique combination of a VNF type and a VNF component; and
executing the monitoring rule corresponding to the new VNF for monitoring the KPIs for determining performance of the new VNF.
7. The method as claimed in claim 6, wherein the method further comprising:
generating the plurality of monitoring rules based on VNF types and VNF components; and
saving the plurality of monitoring rules in the monitoring rules database for being referred for assigning monitoring rules to a VNF at the time of provisioning the VNF.
8. The method as claimed in claim 6, wherein the method further comprising:
determining a KPI value of the KPI being monitored;
comparing the KPI value with a KPI threshold value indicated in the monitoring rule corresponding to the new VNF; and
transmitting, based on the comparing, an error correction request to an automation engine for determining error in a VNF component corresponding to the KPI being monitored.
9. The method as claimed in claim 8, wherein the method further comprising:
receiving a correction request from the automation engine for taking a corrective action; and
taking the corrective action for the new VNF upon receiving the correction request.
10. The method as claimed in claim 6, wherein the deploying the monitoring rule comprising:
updating the monitoring rule corresponding to the new VNF based on the KPI parameters indicated in the VNF monitoring notification.
11. The method as claimed in claim 6, wherein the method further comprising:
receiving a provisioning request for implementing the new VNF;
provisioning resources to the new VNF using the provisioning template; and
transmitting a VNF monitoring notification to a monitoring engine for monitoring the new VNF, wherein the VNF monitoring notification indicates the KPI to be monitored for the new VNF and the KPI parameters corresponding to the KPI.
12. A non-transitory computer readable medium having a set of computer readable instructions that, when executed, cause a processor to:
receive a virtualized network function (VNF) monitoring notification for monitoring a new VNF provisioned, wherein the VNF monitoring notification indicates a key performance indicator (KPI) to be monitored for the new VNF and KPI parameters corresponding to the KPI, and wherein the KPI corresponds to a VNF component that has to be monitored, from among the VNF components allocated to the new VNF;
determine a predefined monitoring rule corresponding to the new VNF, from among a plurality of monitoring rules predefined in a monitoring rules database, based on the KPI, wherein each monitoring rule corresponds to a unique combination of a VNF type and a VNF component;
execute the monitoring rule corresponding to the new VNF for monitoring performance of the new VNF using the KPI parameters;
monitor the performance of the VNF component to determine a KPI value of the KPI being monitored; and
compare the KPI value with a KPI threshold value indicated in the monitoring rule corresponding to the new VNF to determine whether a corrective action needs to be taken for the new VNF.
13. The non-transitory computer readable medium of claim 12, wherein the computer readable instructions, when executed, further cause the processor to:
generate the plurality of monitoring rules based on VNF types and VNF components; and
save the plurality of monitoring rules in the monitoring rules database for being referred for assigning monitoring rules to a VNF at the time of provisioning the VNF.
14. The non-transitory computer readable medium of claim 12, wherein the computer readable instructions, when executed, further cause the processor to:
receive a provisioning request for implementing the new VNF;
analyze the provisioning request to determine a VNF type of the new VNF and VNF components to be allocated to the new VNF;
obtain a provisioning template for provisioning the new VNF based on the provisioning request;
update the provisioning template to include the KPI to be monitored and the KPI parameters based on the VNF component that has to be monitored, wherein the KPI parameters include a target, a KPI threshold value, and a frequency; and
provision resources to the new VNF using the provisioning template.
15. The non-transitory computer readable medium of claim 12, wherein the computer readable instructions, when executed, further cause the processor to:
update the monitoring rule corresponding to the new VNF based on the KPI parameters indicated in the VNF monitoring notification before deploying the monitoring rule for monitoring performance of the new VNF.
US15/737,327 2015-06-16 2015-11-10 Virtualized network function monitoring Active 2035-11-29 US10680896B2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
IN3016/CHE/2015 2015-06-16
IN2016/CHE/2015 2015-06-16
IN3016CH2015 2015-06-16
PCT/US2015/059849 WO2016204804A1 (en) 2015-06-16 2015-11-10 Virtualized network function monitoring

Publications (2)

Publication Number Publication Date
US20180176088A1 true US20180176088A1 (en) 2018-06-21
US10680896B2 US10680896B2 (en) 2020-06-09

Family

ID=57546236

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/737,327 Active 2035-11-29 US10680896B2 (en) 2015-06-16 2015-11-10 Virtualized network function monitoring

Country Status (4)

Country Link
US (1) US10680896B2 (en)
EP (1) EP3281360B1 (en)
CN (1) CN107534570B (en)
WO (1) WO2016204804A1 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180212819A1 (en) * 2015-09-22 2018-07-26 Huawei Technologies Co., Ltd. Troubleshooting Method and Apparatus
US20180367418A1 (en) * 2017-06-16 2018-12-20 Cisco Technology, Inc. Releasing and retaining resources for use in a nfv environment
US20190028350A1 (en) * 2017-07-20 2019-01-24 Cisco Technology, Inc. Dynamic and customizable virtual network functions
US10389823B2 (en) * 2016-06-10 2019-08-20 Electronics And Telecommunications Research Institute Method and apparatus for detecting network service
US10461999B2 (en) * 2014-04-15 2019-10-29 Nicira, Inc. Methods and systems for managing interconnection of virtual network functions
US10608907B2 (en) * 2018-05-11 2020-03-31 At&T Intellectual Property I, L.P. Open-loop control assistant to guide human-machine interaction
WO2020091777A1 (en) * 2018-11-01 2020-05-07 Hewlett Packard Enterprise Development Lp Modifying resource allocation or policy responsive to control information from a virtual network function
CN111128357A (en) * 2019-12-30 2020-05-08 南京天溯自动化控制***有限公司 Monitoring method and device for hospital logistics energy consumption target object and computer equipment
US11068314B2 (en) 2017-03-29 2021-07-20 Juniper Networks, Inc. Micro-level monitoring, visibility and control of shared resources internal to a processor of a host machine for a virtual environment
US11140039B2 (en) * 2013-09-26 2021-10-05 Appformix Inc. Policy implementation and management
US11188371B2 (en) * 2016-05-12 2021-11-30 Telefonaktiebolaget Lm Ericsson (Publ) Monitoring controller and a method performed thereby for monitoring network performance
US11201798B2 (en) * 2018-05-07 2021-12-14 At&T Intellectual Property I, L.P. Automated virtual network function modification
US11240128B2 (en) 2017-03-29 2022-02-01 Juniper Networks, Inc. Policy controller for distributed virtualization infrastructure element monitoring
US11323327B1 (en) 2017-04-19 2022-05-03 Juniper Networks, Inc. Virtualization infrastructure element monitoring and policy control in a cloud environment using profiles
US20230050998A1 (en) * 2020-02-26 2023-02-16 Rakuten Symphony Singapore Pte. Ltd. Computer system and network service construction method
US11658874B2 (en) 2015-07-29 2023-05-23 Juniper Networks, Inc. Assessment of operational states of a computing environment

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10355912B2 (en) 2017-04-06 2019-07-16 At&T Intellectual Property I, L.P. Network trouble shooting digital assistant system
CN109257240B (en) * 2017-07-12 2021-02-23 上海诺基亚贝尔股份有限公司 Method and device for monitoring performance of virtualized network functional unit
CN109257241B (en) * 2017-07-13 2021-02-05 中国电信股份有限公司 Method, device and system for evaluating performance of virtual network element functional module
JP6973300B2 (en) * 2018-06-04 2021-11-24 日本電信電話株式会社 Service chain design equipment, service chain design method, and service chain design program
CN112311578B (en) * 2019-07-31 2023-04-07 ***通信集团浙江有限公司 VNF scheduling method and device based on deep reinforcement learning

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080196002A1 (en) * 2007-02-09 2008-08-14 Klaus Koster Template-based rule generation
US20080312986A1 (en) * 2007-06-18 2008-12-18 Braun Alan D Implementing Key Performance Indicators in a Service Model
US20090037210A1 (en) * 2007-07-30 2009-02-05 Nir Shimoni System and method for real time monitoring of digital campaigns
US20120041625A1 (en) * 2010-08-10 2012-02-16 Tesla Motors, Inc. Efficient Dual Source Battery Pack System for an Electric Vehicle
US20150082308A1 (en) * 2013-09-13 2015-03-19 Ntt Docomo, Inc. Method and apparatus for network virtualization
US20160154692A1 (en) * 2014-11-28 2016-06-02 Software Ag Systems and/or methods for handling erroneous events in complex event processing (cep) applications
US20160205697A1 (en) * 2015-01-14 2016-07-14 Futurewei Technologies, Inc. Analytics-Assisted, Multi-agents, Self-Learning, Self-managing, Flexible and Adaptive Framework for Intelligent SON
US9407514B2 (en) * 2011-07-11 2016-08-02 Hewlett Packard Enterprise Development Lp Virtual machine placement
US20170180189A1 (en) * 2014-06-03 2017-06-22 Nokia Solutions And Networks Oy Functional status exchange between network nodes, failure detection and system functionality recovery
US9923952B2 (en) * 2012-06-08 2018-03-20 Hewlett Packard Enterprise Development Lp Cloud application deployment

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8665733B2 (en) 2011-09-30 2014-03-04 Alcatel Lucent Method and apparatus for round trip delay KPI monitoring in live network using user plane probe session
CN103178990A (en) 2011-12-20 2013-06-26 ***通信集团青海有限公司 Network device performance monitoring method and network management system
WO2014008915A1 (en) 2012-07-09 2014-01-16 Telefonaktiebolaget L M Ericsson (Publ) Network management systems for controlling performance of a communication network
JP5986692B2 (en) * 2013-01-11 2016-09-06 華為技術有限公司Huawei Technologies Co.,Ltd. Network function virtualization for network devices
US9973375B2 (en) 2013-04-22 2018-05-15 Cisco Technology, Inc. App store portal providing point-and-click deployment of third-party virtualized network functions
KR102153585B1 (en) * 2013-06-24 2020-09-09 한국전자통신연구원 Method and apparatus for network functions virtualization
EP3077907B1 (en) * 2013-12-06 2019-08-14 Nokia Solutions and Networks Oy Management of network entity selection
CN104657250B (en) * 2014-12-16 2018-07-06 无锡华云数据技术服务有限公司 A kind of monitoring system and its monitoring method that performance monitoring is carried out to cloud host

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080196002A1 (en) * 2007-02-09 2008-08-14 Klaus Koster Template-based rule generation
US20080312986A1 (en) * 2007-06-18 2008-12-18 Braun Alan D Implementing Key Performance Indicators in a Service Model
US20090037210A1 (en) * 2007-07-30 2009-02-05 Nir Shimoni System and method for real time monitoring of digital campaigns
US20120041625A1 (en) * 2010-08-10 2012-02-16 Tesla Motors, Inc. Efficient Dual Source Battery Pack System for an Electric Vehicle
US9407514B2 (en) * 2011-07-11 2016-08-02 Hewlett Packard Enterprise Development Lp Virtual machine placement
US9923952B2 (en) * 2012-06-08 2018-03-20 Hewlett Packard Enterprise Development Lp Cloud application deployment
US20150082308A1 (en) * 2013-09-13 2015-03-19 Ntt Docomo, Inc. Method and apparatus for network virtualization
US20170180189A1 (en) * 2014-06-03 2017-06-22 Nokia Solutions And Networks Oy Functional status exchange between network nodes, failure detection and system functionality recovery
US20160154692A1 (en) * 2014-11-28 2016-06-02 Software Ag Systems and/or methods for handling erroneous events in complex event processing (cep) applications
US20160205697A1 (en) * 2015-01-14 2016-07-14 Futurewei Technologies, Inc. Analytics-Assisted, Multi-agents, Self-Learning, Self-managing, Flexible and Adaptive Framework for Intelligent SON

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11140039B2 (en) * 2013-09-26 2021-10-05 Appformix Inc. Policy implementation and management
US10461999B2 (en) * 2014-04-15 2019-10-29 Nicira, Inc. Methods and systems for managing interconnection of virtual network functions
US11658874B2 (en) 2015-07-29 2023-05-23 Juniper Networks, Inc. Assessment of operational states of a computing environment
US10601643B2 (en) * 2015-09-22 2020-03-24 Huawei Technologies Co., Ltd. Troubleshooting method and apparatus using key performance indicator information
US20180212819A1 (en) * 2015-09-22 2018-07-26 Huawei Technologies Co., Ltd. Troubleshooting Method and Apparatus
US11188371B2 (en) * 2016-05-12 2021-11-30 Telefonaktiebolaget Lm Ericsson (Publ) Monitoring controller and a method performed thereby for monitoring network performance
US10389823B2 (en) * 2016-06-10 2019-08-20 Electronics And Telecommunications Research Institute Method and apparatus for detecting network service
US11068314B2 (en) 2017-03-29 2021-07-20 Juniper Networks, Inc. Micro-level monitoring, visibility and control of shared resources internal to a processor of a host machine for a virtual environment
US11888714B2 (en) 2017-03-29 2024-01-30 Juniper Networks, Inc. Policy controller for distributed virtualization infrastructure element monitoring
US11240128B2 (en) 2017-03-29 2022-02-01 Juniper Networks, Inc. Policy controller for distributed virtualization infrastructure element monitoring
US11323327B1 (en) 2017-04-19 2022-05-03 Juniper Networks, Inc. Virtualization infrastructure element monitoring and policy control in a cloud environment using profiles
US10735275B2 (en) * 2017-06-16 2020-08-04 Cisco Technology, Inc. Releasing and retaining resources for use in a NFV environment
US20180367418A1 (en) * 2017-06-16 2018-12-20 Cisco Technology, Inc. Releasing and retaining resources for use in a nfv environment
US11196640B2 (en) 2017-06-16 2021-12-07 Cisco Technology, Inc. Releasing and retaining resources for use in a NFV environment
US20190028350A1 (en) * 2017-07-20 2019-01-24 Cisco Technology, Inc. Dynamic and customizable virtual network functions
US20210328873A1 (en) * 2017-07-20 2021-10-21 Cisco Technology, Inc. Dynamic and customizable virtual network functions
US11070432B2 (en) * 2017-07-20 2021-07-20 Cisco Technology, Inc. Dynamic and customizable virtual network functions
US11201798B2 (en) * 2018-05-07 2021-12-14 At&T Intellectual Property I, L.P. Automated virtual network function modification
US10608907B2 (en) * 2018-05-11 2020-03-31 At&T Intellectual Property I, L.P. Open-loop control assistant to guide human-machine interaction
WO2020091777A1 (en) * 2018-11-01 2020-05-07 Hewlett Packard Enterprise Development Lp Modifying resource allocation or policy responsive to control information from a virtual network function
US11677622B2 (en) 2018-11-01 2023-06-13 Hewlett Packard Enterprise Development Lp Modifying resource allocation or policy responsive to control information from a virtual network function
CN111128357A (en) * 2019-12-30 2020-05-08 南京天溯自动化控制***有限公司 Monitoring method and device for hospital logistics energy consumption target object and computer equipment
US20230050998A1 (en) * 2020-02-26 2023-02-16 Rakuten Symphony Singapore Pte. Ltd. Computer system and network service construction method
US11844016B2 (en) * 2020-02-26 2023-12-12 Rakuten Symphony Singapore Pte. Ltd. Computer system and network service construction method

Also Published As

Publication number Publication date
EP3281360B1 (en) 2020-01-01
WO2016204804A1 (en) 2016-12-22
EP3281360A4 (en) 2018-08-22
CN107534570A (en) 2018-01-02
CN107534570B (en) 2021-08-24
EP3281360A1 (en) 2018-02-14
US10680896B2 (en) 2020-06-09

Similar Documents

Publication Publication Date Title
US10680896B2 (en) Virtualized network function monitoring
CN110865867B (en) Method, device and system for discovering application topological relation
US11582165B1 (en) Dynamic resource allocation of cloud instances and enterprise application migration to cloud architecture
EP3231135B1 (en) Alarm correlation in network function virtualization environment
US20120311128A1 (en) Performance testing in a cloud environment
US10970117B1 (en) Dynamic configuration of virtual machines
US11652708B2 (en) Policies for analytics frameworks in telecommunication clouds
US11381451B2 (en) Methods, systems, and computer readable mediums for selecting and configuring a computing system to support a replicated application
EP3218805B1 (en) Method and system for model-driven, affinity-based, network functions
US20150019722A1 (en) Determining, managing and deploying an application topology in a virtual environment
US20170230266A1 (en) Evaluating resource performance from misaligned cloud data
US11765014B2 (en) Intent-based distributed alarm service
US8521861B2 (en) Migrating device management between object managers
US9380018B2 (en) System and method for communicating in a telecommunication network via common key routing and proxies
US10469400B2 (en) Method and apparatus for provisioning of resources to support applications and their varying demands
US10397071B2 (en) Automated deployment of cloud-hosted, distributed network monitoring agents
US10630598B1 (en) Adaptively monitoring and scaling collections of computing resources
US9338126B2 (en) System and method for communicating in a telecommunication network via independent key routing and data locality tables
US10102101B1 (en) Methods, systems, and computer readable mediums for determining a system performance indicator that represents the overall operation of a network system
CN108123821B (en) Data analysis method and device
WO2023219603A1 (en) Apparatus and method for centralized fault monitoring

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ELLAPPAN, KUMARESAN;GOURGONDA, ULHAS DHRAMARAO;SUBRAMANYAM, GAJENDRA;SIGNING DATES FROM 20150615 TO 20150616;REEL/FRAME:044416/0708

Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:044888/0001

Effective date: 20151027

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4